krb5-plugin-preauth-pkinit-1.8.3-67.1e>UA#}1+?#j_y?RT$j#vOtd2rPk+wx̍*>5?d# ( \ !BHP` h p   w(89:{F`GtHIXY\]^bJcddeifnlpzCkrb5-plugin-preauth-pkinit1.8.367.1MIT Kerberos5 Implementation--PKINIT preauth PluginKerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. This package includes a PKINIT plugin. Authors: -------- The MIT Kerberos Team Sam Hartman Ken Raeburn Tom Yu Rbuild05openSUSE 11.4openSUSEMIThttp://bugs.opensuse.orgProductivity/Networking/Securityhttp://web.mit.edu/kerberos/www/linuxi586AAARRRRdf1cb9274f02ffac163c8e4c2f298e9frootrootrootrootrootrootrootrootkrb5-1.8.3-67.1.src.rpmpkinit.so.0pkinit.so.0(HIDDEN)pkinit.so.0(pkinit.so.0)pkinit.so.0(pkinit_0_MIT)krb5-plugin-preauth-pkinitkrb5-plugin-preauth-pkinit(x86-32)  @@@@@@@@@@@@@@@@ rpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libc.so.6(GLIBC_2.8)libcom_err.so.2libcrypto.so.1.0.0libdl.so.2libdl.so.2(GLIBC_2.0)libdl.so.2(GLIBC_2.1)libk5crypto.so.3libk5crypto.so.3(k5crypto_3_MIT)libkrb5.so.3libkrb5.so.3(krb5_3_MIT)rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.6-14.8.0R|@QzQu&@QLGP@O@NMM~@M6@L8LeL|L|L@LT@KKŮ@KK"@K@K@KK&(JJ@JY@J&eJ @ckornacker@suse.dejohann.luce@wanadoo.frmc@suse.dewr@rosenauer.orgmc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.delchiquitto@novell.commc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.demc@suse.dejengelh@medozas.demc@suse.decoolo@novell.commc@suse.demc@suse.de- fix Multi-realm KDC null deref CVE-2013-1418 (bnc#849240) + added bug-849240-CVE-2013-1418-fix-multi-realm-kdc-null-deref.dif- fix a kpasswd UDP ping-pong security bug (CVE-2002-2443) with CVE-2002-2443.patch- fix prep_reprocess_req NULL pointer deref CVE-2013-1416 (bnc#816413) bug-816413-CVE-2013-1416-prep_reprocess_req-NULL-ptr-deref.dif- fix PKINIT null pointer deref CVE-2013-1415 (bnc#806715) bug-806715-CVE-2013-1415-fix-PKINIT-null-pointer-deref.dif- fix potentially execute code flaws CVE-2012-1015 (bnc#770172)- fix kadmind denial of service via null pointer dereference CVE-2012-1013 (bnc#765485)- fix kdc remote denial of service (MITKRB5-SA-2011-006, bnc#719393) CVE-2011-1528, CVE-2011-1529- fix kadmind invalid pointer free() (MITKRB5-SA-2011-004, bnc#687469) CVE-2011-0285- Fix vulnerability to a double-free condition in KDC daemon (MITKRB5-SA-2011-003, bnc#671717) CVE-2011-0284- Fix kpropd denial of service (MITKRB5-SA-2011-001, bnc#662665) CVE-2010-4022 - Fix KDC denial of service attacks with LDAP back end (MITKRB5-SA-2011-002, bnc#663619) CVE-2011-0281, CVE-2011-0282- Fix multiple checksum handling vulnerabilities (MITKRB5-SA-2010-007, bnc#650650) CVE-2010-1324 * krb5 GSS-API applications may accept unkeyed checksums * krb5 application services may accept unkeyed PAC checksums * krb5 KDC may accept low-entropy KrbFastArmoredReq checksums CVE-2010-1323 * krb5 clients may accept unkeyed SAM-2 challenge checksums * krb5 may accept KRB-SAFE checksums with low-entropy derived keys CVE-2010-4020 * krb5 may accept authdata checksums with low-entropy derived keys CVE-2010-4021 * krb5 KDC may issue unrequested tickets due to KrbFastReq forgery- fix csh profile (bnc#649856)- update to krb5-1.8.3 * remove patches which are now upstrem - krb5-1.7-MITKRB5-SA-2010-004.dif - krb5-1.8.1-gssapi-error-table.dif - krb5-MITKRB5-SA-2010-005.dif- change environment variable PATH directly for csh (bnc#642080)- fix a dereference of an uninitialized pointer while processing authorization data. CVE-2010-1322, MITKRB5-SA-2010-006 (bnc#640990)- add correct error table when initializing gss-krb5 (bnc#606584, bnc#608295)- fix GSS-API library null pointer dereference CVE-2010-1321, MITKRB5-SA-2010-005 (bnc#596826)- fix a double free vulnerability in the KDC CVE-2010-1320, MITKRB5-SA-2010-004 (bnc#596002)- update to version 1.8.1 * include krb5-1.8-POST.dif * include MITKRB5-SA-2010-002- update krb5-1.8-POST.dif- fix a bug where an unauthenticated remote attacker could cause a GSS-API application including the Kerberos administration daemon (kadmind) to crash. CVE-2010-0628, MITKRB5-SA-2010-002 (bnc#582557)- add post 1.8 fixes * Add IPv6 support to changepw.c * fix two problems in kadm5_get_principal mask handling * Ignore improperly encoded signedpath AD elements * handle NT_SRV_INST in service principal referrals * dereference options while checking KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT * Fix the kpasswd fallback from the ccache principal name * Document the ticket_lifetime libdefaults setting * Change KRB5_AUTHDATA_SIGNTICKET from 142 to 512- update to version 1.8 * Increase code quality * Move toward improved KDB interface * Investigate and remedy repeatedly-reported performance bottlenecks. * Reduce DNS dependence by implementing an interface that allows client library to track whether a KDC supports service principal referrals. * Disable DES by default * Account lockout for repeated login failures * Bridge layer to allow Heimdal HDB modules to act as KDB backend modules * FAST enhancements * Microsoft Services for User (S4U) compatibility * Anonymous PKINIT - fix KDC denial of service CVE-2010-0283, MITKRB5-SA-2010-001 (bnc#571781) - fix KDC denial of service in cross-realm referral processing CVE-2009-3295, MITKRB5-SA-2009-003 (bnc#561347) - fix integer underflow in AES and RC4 decryption CVE-2009-4212, MITKRB5-SA-2009-004 (bnc#561351) - moved krb5 applications (telnet, ftp, rlogin, ...) to krb5-appl- add baselibs.conf as a source- enhance '$PATH' only if the directories are available and not empty (bnc#544949)- readd lost baselibs.conf- update to final 1.7 release- update to version 1.7 Beta2 * Incremental propagation support for the KDC database. * Flexible Authentication Secure Tunneling (FAST), a preauthentiation framework that can protect the AS exchange from dictionary attack. * Implement client and KDC support for GSS_C_DELEG_POLICY_FLAG, which allows a GSS application to request credential delegation only if permitted by KDC policy. * Fix CVE-2009-0844, CVE-2009-0845, CVE-2009-0846, CVE-2009-0847 -- various vulnerabilities in SPNEGO and ASN.1 code.build05 13846855271.8.3-67.11.8.3-67.1krb5pluginspreauthpkinit.so/usr/lib//usr/lib/krb5//usr/lib/krb5/plugins//usr/lib/krb5/plugins/preauth/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Evergreen:Maintenance:212/openSUSE_Evergreen_11.4/dc830de05bda17529df2d5ca56690536-krb5.openSUSE_Evergreen_11.4drpmlzma5i586-suse-linux$&.9#NIOj?]"k%O^͵ ҶVDu&O$0$? @-Dv=fL󙀋\ѧ.
{m}^O iMːF]oy|ܔř8z$17Ltto򞙰C7\$8dѹ k]e_ߐ*}ˀ{)uv+ZUzԥxrV9RDRl0ᝉ Rvx Z[0 (gɸf񆱣9ʳfOi6vQ>)Mή\YŠmހζyӚ`'"-?Lѫj_7b֒-> }pu75˯WlG3l8`0-.nܖd?pym< =}M3?Avjѐ;\%aW±v `X%LDf0<׭4pJʳ$8[?Qr%N'Ry!]/^.1/m䴶վzߺf~P?ֵn5'0:H5ow1`2'wDi v`)us@>x@aGel򖬕ұ?1okʋPwň呔G,V܇N6h='GrZ